Table of contents
Chapter 1 Overview................................................ 1
Chapter 2 AML/CFT systems and business
conducted outside Hong Kong ......... 12
Chapter 3 Risk-based approach ......................... 19
Chapter 4 Customer due diligence .................... 24
Chapter 5 Ongoing monitoring ........................... 79
Chapter 6 Financial sanctions and terrorist
financing.............................................. 83
Chapter 7 Suspicious transaction reports ........ 89
Chapter 8 Record-keeping ................................ 105
Chapter 9 Staff training ..................................... 109
Chapter 10 Wire transfers ................................... 113
Appendix A Examples of reliable and independent sources for customer identification purposes .......................................... 124
Appendix B Sample correspondence issued by the JFIU .................................................... 126
Glossary of key terms and abbreviations ............. 130